Copy Link
Add to Bookmark
Report

Pirate Vol 1 Issue 1

eZine's profile picture
Published in 
Pirate
 · 5 years ago

  


*******************************************************
** _______ ____ **
** IIIII I IIIII IIIII I I **
** I II I I II I I I I____ **
** III I III IIIII I I **
** I I I I I I I I **
** I I I I I I I I____ **
**keepin' the dream alive **
*******************************************************

-=> VOLUME 1, ISSUE 1, June, 1989 <=-

**** WELCOME ****

To the first issue of -=* PIRATE *=-!
Special thanks for getting this issue out go to:
Jedi
Spanky
Jim Richards
Hatchet Molly
Chris Robin
Maxx Cougar
Taran King
Knight Lightning
Flint
The Man

Any comments, or if you want to contribute, most of us can
be reached at one of the following boards:
GREAT ESCAPE (312) 535-2761 >>> PIRATE HOME BOARD
SYCAMORE ELITE (815) 895-5733
THE UNDERGROUND (201) 957-1976
PACIFIC ALLIANCE (818) 280-5710
BITNET ADDRESS (Chris Robin): TK0EEE1@NIU.BITNET

+++++++++++++++++++++++++++++++++++++++++++++++++++++

Our goal is to share knowledge, gossip, information, and tips
for warez hobbyists.

TABLE OF CONTENTS

*. What's a Pirate?
*. Pirate Do's and Don'ts
*. Pirate tips
*. Why Software ownership is bad for society
*. Copyright Law
*. Computer laws in Wisconsin
*. Editorial: Big Brother in the Computer Room?
*. Sysop's corner
*. What's hot, what's not
*. Wants and Needs
*. Board Review of the Month: THE GREAT ESCAPE
*. A few decent boards

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
* * * * SO YOU WANT TO BE A PIRATE? * * * *
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

What's a pirate? COMPUTER PIRACY is copying and
distribution of copyright software (warez). Pirates are
hobbyists who enjoy collecting and playing with the latest
programs. Most pirates enjoy collecting warez, getting them
running, and then generally archive them, or store them away. A
PIRATE IS NOT A BOOTLEGGER. Bootleggers are to piracy what a
chop-shop is to a home auto mechanic. Bootleggers are people who
DEAL stolen merchandise for personal gain. Bootleggers are
crooks. They sell stolen goods. Pirates are not crooks, and
most pirates consider bootleggers to be lower life forms than
child molesters.

Pirates SHARE warez to learn, trade information, and have fun!
But, being a pirate is more than swapping warez. It's a life
style and a passion. The office worker or class mate who brings
in a disk with a few files is not necessarily a pirate any more
than a friend laying a copy of the lastest Depeche Mode album on
you is a pirate. The *TRUE* pirate is plugged into a larger
group of people who share similar interests in warez. This is
usually done through Bulletin Board Systems (BBSs), and the
rule of thumb is "you gotta give a little to get a little...ya
gets back what ya gives." Pirates are NOT freeloaders, and only
lamerz think they get something for nothing.

A recent estimate in the Chicago Tribune (March 25, p. VII: 4)
indicated that computer manufacturers estimate the cost of
computer piracy at over $4 billion annually. This is absurd, of
course. Businesses rarely pirate warez, because the penalties for
discovery do not make it cost effective. Individuals who pirate
are rarely going to spend several thousand dollars a year for
warez they generally have little practical use for, and there's a
lot of evidence that pirates spend more money on warez they
probably don't need. In fact, pirates may be one of the best
forms of advertising for quality products, because sharing allows
a shop-around method for buying warez. Most of us buy a program
for the documents and the support, but why invest in four or five
similar programs if we aren't sure which best suits our needs?
Nah, pirates aren't freeloaders.

Is piracy unethical? It may be illegal, although most states have
laws providing a grey area between archiving (storing) and use.
But, is it UNETHICAL? We think not. We challenge the claim that
pirates cost software manufactures any lost revenue, and will
argue that they spread the word for high quality products. The
average person cannot afford the mega-bucks needed to buy Dbase-4
and Foxbase, and would do without either if forced to buy. But,
by testing out both, we are able to inform those who WILL buy
which is better. So, we spread computer literacy, indirectly
encourage improvements, and keep the market alive. Pirates hurt
no one, take money from nobody's pocket, and contribute far more
to the computer industry than they are willing to acknowledge.

How many of us have had mega-fone bills in a month? The
tele-comm folks must love pirates. No, pirates aren't cheap
skates. The fun of finding an obscure program for somebody, the
thrill of cracking a program, the race to see who can be the
first to upload the latest version--these are the lure of piracy.
We are collections of information. Unlike those who would keep
computer literacy to the affluent few, we make it more readily
available to the masses.

So what's a pirate? A pirate is somebody who believes that
information belongs to the people. Just as a book can be zeroxed
or placed in a library to be shared, pirates provide a type of
library service. The experienced pirate even acts as a tutor in
helping those who may have purchased warez. We don't bitch about
serving as unpaid consultants to the computer industry, and we
don't wouldn't think to request payment for our services. By
providing a user-friendly network of information sharers, we
increase computer literacy which is in everybody's mutual
interests.

The software industry is unlikely to acknowledge (or even
recognize) the contributions of pirates to their enterprise, and
continue to view us as "the enemy!" Pirates are not represented
in legislation and have no strong constituency to challenge
misrepresentation. PIRATE NEWSLETTER is intended to break down
the power of media to define us as crooks and outcasts and bring
us together. By keeping information open and flowing and not
under the control of a privileged few, we are enhancing democracy
and freedom of the market place.

PIRATES ARE FREEDOM FIGHTERS KEEPNG THE DREAM ALIVE!

>> *END* <<

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
* * * * PIRATE DOs AND DON'Ts * * **
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

If you want to get on an elite board and stay there, there's
some things you should do, and some things that are taboo.
Here's a partial list:

-----
DO:
-----

1. DO make copies from original disks, and be sure to put the
version of the product in the description.
2. DO put "read me" tips in the first disk if there's a trick
to getting a program working.
3. DO put up complete files, NOT partial files, and label
them as they are on the disk.
4. DO put in the file description whether the program is
cracked or uncracked
5. DO read the message section of the boards, and contribute
when you can. Don't be afraid to ask dumb questions.
6. DO make sure you have sufficient space on your hard drive
or disks when downloading a large file.
This may sound silly, but it's not unusual especially for
novices to forget space and botch a download.
7. DO make sure to describe whether a program you uploaded
has special requirements (mouse, math co-processor).
8. DO keep up on protocols...use the fastest available.
Using Xmodem is a sure sign of a lamer.
9. DO read the bulletins and check to be sure the board
doesn't already have a copy of what you are uploading.
10. DO use zip comments to specify what a disk is.
----------------
------
DONT:
-----
1. DON'T whine and swear at the sysop. You get on a board
and get more access as you prove yourself deserving.
2. DON'T upload .gif files and other programs that are a
dime a dozen and of little use. Upload what you would like
to receive.
3. DON'T start changing handles for every board. Most BBSers
are known by one handle, and change only if there is a good
reason to.
4. DON'T phreak to a pirate board. It draws attention to the
board and makes life miserable for everybody.
5. DON'T logoff prematurely. Use the board's logoff command.
6. DON'T change the names of a file just to get upload credit.
This is a sure way to get kicked off any board.
7. DON'T start flaming other users. Pirate boards are SHARE
boards, and most users would rather read some good tips
and not engage in petty arguments.
8. DON'T upload faulty files or incomplete files. Be sure
it's all there. If it isn't, at least indicate that in the
file description.
9. DON'T blame the sysop for faulty files until you have
at least tried leaving messages for help.
10. DON'T log on just to look around...upload or post something.
If you don't SHARE, you're taking time away from other
users.

>> *END* <<

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
* * * * PIRATE TIPS * * * *
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

------------
DOCUMENTS:
------------

Some programs require dox for full use their capabilities.
There are document files for some programs floating around,
and if you have any, upload and spread them to your favorite
boards or use e-mail (bitnet) to get them to friends.
QUE publishes a variety of texts that in most cases are more
helpful than the original documentation. These include tips on
most LOTUS program, dBase-4, Rbase, Q&A, Excell, Wordperfect,
Word Star, Paradox, DisplayWrite, Microsoft Word, SuperCalc,
PageMaker, and many, many more. Most large bookstores carry these
(or will order them), or you can call QUE's order line at
1-800-428-5331.

------------------
UPLOADING FILES:
------------------

One of the biggest hassles is downloading a file only to find
that it doesn't work or that not all files are included. When
you upload a program, BE SURE TO use a diskcopy command that
copies the ENTIRE program, including subdir, label each disk (or
file) as it appears on the original. If a program is snatched or
if there are any problems, you should specify when uploading. USE
THE ZIP COMMENT (pkzip -z /filename) command to label each file.
So, if you upload a 5 disk set, and if the first disk from the
original files is the program files, be sure this is the first
disk you zip and upload. Label it something like MYFILE-1 and in
the zip command label it as it is labeled on the original.
NEVER(!!) install a program, especially a large on such as ALDUS,
and then just zip up the directory into a single multi-meg file
for uploading. REMEMBER: Not all users can handle files over
360 K, so keep files to a manageable size!

-----------------
UNWORKABLE FILES
-----------------

What do you do if you get a program that doesn't work? Check
back with the sysop of the board where you obtained it.
Most sysops appreciate being told of problems---if you have
a problem, somebody else will likely have the same problem, and
it doesn't do the sysop a favor to keep silent. Sometimes it's
just a matter of finding the right trick, but if it's a bad
program, it should be taken off the board ASAP! But don't bitch
at the sysop--Nothing's worse than a whiney user. If you
find there's a trick to getting a program working, leave a
message on the board. Remember the motto: ONE FOR ALL, and all
that, and SHARING is the pirate credo!!

>> *END* <<

(The following is reprinted from BITNET unedited ((eds.)).
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
* * * Why Software Ownership is bad for Society * * *
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Talk given by Richard Stallman at Univ. of Texas, Feb. 1987.
Square brackets contain comments and clarifications that were not
said in the original talk.

Copyright @copyright%% 1987, Free Software Foundation, Inc.

This is an unedited transcript of an informal talk. Verbatim
copying and redistribution is permitted; alteration is not.

If you are interested in helping to edit this to be more suitable
for publication, please contact the Free Software Foundation:
675 Mass Ave, Cambridge, MA 02139; or send email to
gnu@prep.ai.mit.edu.

The field of software is a fairly new one. About twenty years
ago, people started doing lots of programming. There was no
clear basis in tradition for whether software should be
considered property or not. There were several possible
traditions you could consider extending by analogy to the area of
software, no one of which was inevitable, or necessarily more
right than the others. One of them was the area of mathematics.
Some people believe that a program is like a mathematical
formula, and the tradition for mathematical formulas is that they
couldn't be property. Another thing that programs are like is
recipes. In fact, of all the things that people encounter in
daily life, the recipe is the one that's most like a program.
It's directions for getting something useful done. And recipes,
also, by our traditions cannot be property. There was a third
thing, and that was literature. As it happens, literature
traditionally @emph%could% be property. Programs have something
in common with all three of these things. They don't have more,
particularly, in common with literature than they do with
mathematics or recipes, but the decision was made to treat them
like literature because the people who had the most to gain from
that particular decision were allowed to decide.

But this decision was not good for society as a whole. It's
incredibly destructive, and it feeds an overall destructive
tendency in this society which we can see in every area. And
that's why, having observed the results, I came to the conclusion
that it was unacceptable, that software @emph%cannot% be
property, and that I would dedicate my career to bringing that
about.

If we look at the traditional forms of intellectual property, we
can see they were all designed to fit into niches where they
could exist without doing great harm to society. These niches
were often created by the technology that existed at the time.
For example, consider the area of books, for which copyright was
invented. At the time, books could only be copied by mass
production. Earlier, books were copied one at a time, by hand,
and at that time there was no idea of copyright. In fact, people
didn't even have the @emph%concept% of strictly distinguishing
their original book from a non-original one. It was a continuum.
They recognized that some writers wrote more new things into
their books, while they copied passages [from other books], or
they might just be copying entire books. All of these things
were legitimate, useful activities, though useful in different
ways. But when the printing press was invented, it suddenly
became for all intents and purposes impossible to copy a book by
hand. Not that it was any harder than it had been before, but by
comparison with making a copy on a printing press, it was so
ridiculously impractical that no one would want to do it. The
situation where books were made by mass production lent itself to
copyright in the sense that copyright became a restriction on one
particular kind of industry---a form of industrial regulation.
It didn't take away the rights of the reading public in any way,
because members of the reading public couldn't copy books anyway.
They didn't own printing presses, so it was effectively
impossible for them to copy books. But this niche was created by
a particular technology, and changing technology can make it go
away again. The technology of computer programs has never been
like that.

[I have since learned that people did copy books by hand to a
significant extent after the printing press was developed. What
I said was true in recent times, but in England in the 1500's
(and perhaps later) government-enforced featherbedding among
printers made printed books fairly expensive; as a result, poor
people might more easily afford the time to copy a book than the
price of the book. But these people were not prosecuted for
copying or told it was wrong. Copyright was applied only to
authors and publishers. It was treated as an industrial
regulation.]

If we look, for example, at patents, we find something that was
specifically set up to benefit the @emph%public%, not the
inventor. It was set up to encourage inventors to disclose what
they had invented, and to give them monopolies that were limited
in time, to a time that short compared to the useful life of any
invention then. It's no longer short, compared to the useful
life of any invention today. In fact, core memory was already
pretty much obsolete when its patent ran out. That's a very
famous patent, and I suspect that a lot of other patents have the
same results. But remember, the purpose of setting up patents
was to benefit mainly society as a whole, by encouraging
disclosure and thus making it possible for people to build on
each others' work. You won't find a motive like that among
people who advocate intellectual property today.

In the time that I've worked as a programmer, I've watched things
change from a situation where people generally shared work and
generally used work that had been done in whatever way was
useful, to one in which is nearly impossible to utilize work that
other people have done, where people feel uncomfortably cynical.
Constantly, a person will describe a great piece he's doing
that's so exciting, you ask him %%will I be able to use it?'',
and his face falls, and he says, no, you probably won't be, and
he realizes that he's doing something wrong, but he perhaps
doesn't have the commitment to doing right that would be required
to decide that he wasn't going to do it any more. But that kind
of thing [doing what they know is wrong and being too scared to
stop] demoralizes people.

If we look at the two arguments that are advanced most often
toward intellectual property in software, they are one, the
emotional argument, and two, the economic argument. The
emotional argument goes something like %%I put my sweat, and my
heart, into this program. It's my soul; it comes from @emph%me%,
it's @emph%mine!%.'' Well, it's sort of fishy that most of these
people would then go sell it to a company. And what ever
happened to egoless programming, anyway? So I don't really think
that that argument is worth refuting any harder than that. It's
a feeling that people can cultivate when it suits them, not one
that is inevitable. By comparison, consider all the great
artists and artisans of medieval times, who usually didn't even
sign their names. They didn't consider that it was relevant who
had done the work, only that it existed; and this was the way
people thought for hundreds of years.

The economic argument goes something like, %%I want to get rich
(except that I'll call that %make a living'), and if you don't
allow me to get rich by programming, then I won't program. And
then you'll be screwed---so there!'' Well, I'll explain later
why I think we don't have to go along with that kind of
blackmail. But first I want to address the claim [I should have
said, the implicit assumption] that society actually benefits
from proprietary software development.

The first problem with that argument is that it's comparing the
wrong two things [owned software vs no software]. Certainly,
software development is useful. But to link the development of
the software with subsequent ownership and prevention of use is
to beg the question. The question is, %%Should software
development be linked with some ability to stop people from using
it?'', and in order to decide this, we have to judge the effects
of each of those two activities independently. What I intend to
show is that the effects of @emph%ownership%, by itself, are very
destructive, and therefore, if you want to encourage the
development which is useful, we should not connect it with
something destructive [like ownership]. And I'll go on to
explain other ways in which this [encouragement] can easily be
done.

Let's look at the overall effects of software ownership.
Consider that we have a program that has been developed, and now
it either can be free, or it can be proprietary. There are three
different levels of material harm that come from making it
proprietary. And with each of these, there's a concomitant form
of spiritual harm. By %%spiritual'' I mean the effect on
people's feelings, attitudes, and thoughts of the actions that
they take. These changes in people's ways of thinking will then
have a further effect on their actions in the future.

The first level is the level of simple use of a program. If a
program is successfully made proprietary, that will cause fewer
people to use it. This doesn't make it any less work, however.
Here is a crucial difference between programs and cars, chairs,
or sandwiches. That is, once there's one of them, @emph%anyone%
can essentially snap his fingers and have as many more copies of
the thing as are wanted. This isn't true for material objects,
which are conserved, and which have to be built in the same way
that the first one was built. With material objects, it's not
necessarily destructive to have a price on them because that
means if people decide to buy fewer of them, you can @emph%make%
fewer of them and use fewer resources and spend less of your
time. You might say, %%Well, these people only want to pay for
ten of these, so I'll build ten and I'll spend the rest of the
day going fishing.'' But that's not relevant when the question
is whether @emph%they% should build some more @emph%themselves%,
which is what users will do with free programs. So we find that
there's no overall benefit which comes---no non-selfish,
non-obstructive reason to want to put a price on the use---why
have a disincentive to use something which really costs nothing
to make? A great spiritual harm goes along with this waste,
because of the way it's worked.

The spiritual harm comes from the nondisclosure agreements and
licenses that people sign, because each buyer is asked to betray
his neighbors. If you want to use a program and your neighbor
wants to use the program, the Golden Rule says that you should
want @emph%both% of you to get that program. You shouldn't aim
for a solution where you get it and the other people don't, if
you want to be a good citizen, that is. And the nondisclosure
agreement essentially says %%I promise to be a bad citizen---I
promise to say %To hell with my neighbors!' To hell with
everyone! Just give @emph%me% a copy!''. And you can see the
spiritual effect that has on the community you live in.

A lot of people unconsciously recognize this and that's why the
decide to share programs anyway. But they feel somewhat guilty
because they haven't reasoned it out carefully and decided that
the nondisclosure agreements are illegitimate morally. They know
that they must break those agreements in order to be still
friends with their friends, but they still think that the
agreements are valid also, and so they feel @emph%ashamed% of
being friends with their friends. And that's also a kind of
spiritual harm. I say that people shouldn't @emph%have% to
explain in a slightly embarrassed tone of voice that they're
%%pirates''. They shouldn't @emph%think% of themselves as
pirates. They shouldn't use that particular propoganda term.

The second level of material harm is at the level of
@emph%adapting% programs. Most commercially available software
isn't fully available, even commercially. It's available for you
to take it or leave it, but it's not available for you to change.
But changing programs is an incredibly useful thing, and if that
is prevented, it's a great harm. I have a friend who told me
that she worked as a programmer in a bank for about six months,
writing a program that was pretty close to something that was
commercially available, and she thought that if she could have
gotten source code for that commercially available program, it
would have taken much less than six months to adapt it to their
needs. But they couldn't get the source code, so she had to do a
lot of make-work, a lot of work that you would include in the GNP
but was really totally useless. And I'm sure you've all had the
experience as programmers of being frustrated because there was a
program you wanted to change and couldn't.

We can consider what it would be like if recipes were hoarded in
the same fashion as software. You'd say, %%How do I change this
recipe to put in less salt?'', and the great chef says, %%How
dare you insult my recipe, the child of my brain, by trying to
tamper with it? You don't have the judgement to tamper with my
recipe and make it work right!''. %%But my doctor says I'm not
supposed to eat salt! What do I do?''.

The spiritual harm that comes from this is to the spirit of
self-reliance, which used to be greatly valued in this country.
If you can't be self-reliant, then the landscape that you live in
is frozen under someone else's control and you can't change it.
That leads to a demoralized attitude like %%Well, yeah, this
system isn't really what we want, but it's hopeless to think of
trying to change it, so we'll just have to live with it and
suffer and suffer and suffer.'' And nothing can kill morale of
programmers like that.

I remember even at MIT we had an example like that, and I
remember how it demoralized people. Our first graphics printer
was the XGP, which many of you are probably lucky enough not to
have heard of. But that was available ten years ago or more.
And all the software for that was written at MIT, and we could
change it. We put in lots of nice features, such as it would
send you a message when your document had actually been printed;
and it would a send you a message if you had anything queued and
there was a paper jam; and many other nice features. Then later
we got something called the Dover, which was another gift from
Xerox. But there, the software was proprietary, and it ran in a
separate computer that served as the spooler, and we couldn't add
any of those features. So when you got a message that said
%%your document has been sent'', you don't know if it's been
printed, you won't find out when it's been printed, and no one
would get informed when there was a paper jam, so it might sit
there with no one fixing it for an hour. And we all knew that we
were capable of fixing these things, probably as well as the
original authors were, but somebody found it useful to sabotage
us. That was a constant source of frustration.

The third level of material harm is the level of software
development. Software development used to go on by a sort of
evolutionary process, where a person would take a program and
rewrite parts of it for one new feature, and then another person
would rewrite parts to put another new feature in; this could go
on over twenty years. The final program might have many features
that the original one didn't have, but you might still see a few
lines of code that you could recognize by their style as having
been there from ten years before without ever being changed. And
one of the main goals of intellectual property is to prevent this
kind of evolution, to try to make it impossible for you to throw
together a program quickly and easily by cannibalizing things
that are already written. In any kind of intellectual field,
progress is built by standing on the shoulders of others. That's
what's no longer allowed---you can only stand on the shoulders of
the other people in @emph%your company% nowadays.

And the spirit that's harmed by this material harm is the spirit
of scientific cooperation, which used to be so strong that
scientists would cooperate with each other even when they were in
countries that were at war. Nationalism wasn't able to destroy
scientific cooperation, but greed has. Nowadays, people don't
publish enough in their papers to be able to replicate anything.
They publish only enough for you to be able to gaze in amazement
at how much they had been able to do.

[Tape counter 213-227: someone describes the example of
Karmarkar's algorithm, an efficient algorithm for linear
programming that AT&T is keeping secret.]

So now that I have shown all these reasons why ownership of
software is bad for society, I think the conclusion that we
shouldn't allow or recognize in any way a concept such as
ownership of programs. We should say that programs are
@emph%not% property, and if we want to encourage software
development, we should encourage it in another way.

There are many fields in which no one sees a way to get rich by
owning something and no one expects to, but there are still lots
of people eager to work in the field. They compete bitterly,
though more sadly than bitterly, I guess, for the few funded
positions available, none of which is funded very much.

Suddenly, however, when it becomes possible by hoarding
information to get rich, you find people saying that no one will
work in the field if they can't get rich. Well, it may be true
at that moment, but it's a consequence of the expectation that
you @emph%can% get rich. Therefore, we shouldn't assume that it
has to be true in any particular field. It's essentially a
coincidence that that field makes it possible to get rich by
hoarding, and if we were to take away the possibility of getting
rich by hoarding, then after a while, when the people had
intellectually readjusted, they would once again be eager to work
in the field for the joy of working in it, and they would ask us
only to provide them a pittance to live on. And these pittances
can be provided at universities which right now are proprietary
software sellers. They can be supported by hardware
manufacturers which have to do software development anyway, and
twenty years ago did free software development. They can be
supported by government contracts and grants, which actually
support a lot of proprietary software development today. A large
amount of software development is supported one way or another by
the military, some of which may have to do with building weapons,
but not all of it; but it's proprietary anyway, most of the time.

Some people I know right now have a contract to write a
proprietary, improved version of a free program that supports
TCP/IP on IBM PC's. And with this contract, they could make a
living just as well writing free software, but of course they're
not going to; they want to be able to clean up afterwards. And
you all know of people who get research grants to develop
something at a university, and then they make the unfinished
version free, and go on to start companies to sell something with
the last few finishing touches, so that you'd actually want to
use it.

Our whole world, everywhere we look, all forms of good will to
your neighbor are being undermined by the search for ways to
obstruct for profit. Fifty years ago, various people in the
Mafia would go around to stores in the neighborhood and say %%You
have a nice building there; it would be a shame, wouldn't it, if
it burned down, and there have been a lot of fires around here
lately. I think you need some protection''. And this was called
the %%protection racket''. Now we have people going to computer
users and saying, %%You've got some nice software there, but I
paid those congressmen to say it's illegal for you to have it. A
lot of people have been going to jail around here lately for
that. You wouldn't want to go to jail, would you? I think you
need to pay me some money.'' And this is the software protection
racket.

They say that they're providing a useful service to the public,
that they are software publishers, or software stores. But these
functions only appear to be necessary because of the restrictions
they have managed to place on us. You wouldn't need a software
store if software were free. You'd only need the public library,
which would have a computer with copies that you could download,
or copy onto floppies or tapes, of one copy of all the programs
that you'd want. And it wouldn't cost very much---nothing,
compared with what software stores cost to run, to make this
thing go.

But the people in the Mafia fifty years ago didn't want to admit
to themselves---they wanted to pretend to themselves that there
was something legitimate about what they were doing, and that's
why they phrased it in terms of protection. They didn't bluntly
say %%I'll burn your store down if you don't pay me.'' So, too,
the software publishers like to pretend, and speak as if they
were doing something useful, instead of simply saying %%if you
use that program, I'll send some cops after you if you don't pay
me.''

[Unintelligible question, apparently about if there are
sufficient programmers to write software w/o monopolies.
Ans:]

Well how do you know they're not sufficient? So much of software
work today is wasted by duplication that's done only for
proprietary reasons, we could probably get as much software
delivered with half the programmers if we didn't have this form
of featherbedding. In fact, it's sort of funny to look at the
quest for software productivity. There are two meanings you
could have for software productivity. You can look at the
software productivity of the industry as a whole, or you could
ask about the productivity of a particular company. There's a
lot of work being put into increasing the software productivity
of particular companies one by one, but the best way to increase
the productivity of the whole industry is to eliminate the
artificial obstruction. And that would increase productivity far
more than anything people are trying to do now. But they don't
want that, because what they want is productivity of my company,
not productivity that actually benefits society. But they use
that language to try make people overlook the difference.

It's an interesting thing about how language is used for
propoganda. By choosing particular words, you don't @emph%force%
people to think a certain way, but you can strongly suggest
certain avenues of thought. By using a certain word for two
things, you can bias people without their knowing it towards
seeing the similarities and underestimating the differences. And
this is one of the reasons why software hoarders use the terms
%%property rights'' and %%ownership'' and %%theft'' while I use
the term %%software hoarding''. Software hoarding is my name for
the crime of trying to prevent someone else from sharing a
program with a third party. And that's the same thing that's
going on with "software productivity". Software productivity has
two meanings, about which you would say different things, but it
takes a critical eye to realize that there are two meanings. If
you don't look critically, you might say %%Ah! Improving
productivity---that's got to be what we need! Obviously, what we
want to do to make society work better is improve
productivity!''. You wouldn't guess that they're talking about a
very narrow kind of productivity, and excluding something that
comes into the overall productivity, an area where they
themselves are deliberately making things worse.

What can we say, I guess, about the overall effect of technology
on these kinds of restrictions? I've explained how copyright
pretty much made sense. It was only a small restriction on
people's freedom in the technological situation in which it was
invented. But now we've seen a change in technology which makes
copying things one at a time a feasible way to copy, and anyone
can do it as well as anyone else, which changes the fundamental
situation that made copyright legitimate and caused it to become
illegitimate. Right now we've seen half of that transformation
in the copying of books. You can xerox a book now, but only for
very expensive books would you want to, because what you get is
not as nice as a bound book, and it takes you more work to do it.

It fundamentally does cost more (now) to make a book by xeroxing
than it does on a printing press. And it costs the individual
more, so we've only seen a few situations in which people wanted
to make any number of copies of a book by xeroxing. But that's
just a transient state, because soon we're going to have
wonderful computer printers, and we're going to have
digitizers---scanners, and it will be possible to scan any book
quickly, you'll have a robot to turn the pages, and have it on
your disk, and send it across a network to be printed out into a
beautifully bound copy, and at that time, book publishers will be
just as useless to society as software publishers are. And at
that time, the move that's already afoot to eliminate the public
libraries or tax them with royalties, may essentially complete
itself. You may be unable to get a copy of a book without
signing a license of some sort.

In general, the entire thrust of information technology is that
information is completely interconvertible. Any form can be
changed into any form. Nothing is ever lost. And also, the
whole idea of the computer is that it's a universal machine.
It's a machine that can be programmed to simulate any other
machine. Why is this better than building a specific machine?
It's because you can change the program, because you can copy the
program, load in new programs. The ability to copy and the
ability to change a program are the entire basis for the
usefulness of the computer. And those are precisely what the
software owners don't want the public to be able to do. Software
owners want to reserve all the benefits of computer technology to
themselves, with only a %%trickle down'' to the public. I say
the public should not allow this. If we call the bluff of the
programmers or the programming investors, they won't have as many
Porsches and they won't eat as much sushi. But once they are
willing to go along with that, they'll find that there are other
ways of organizing businesses that are less profitable, but
enough for a good number of programmers to make a living
nonetheless. And we'll take a great step forward toward a world
in which it's much @emph%easier% to make a living, because there
won't be as obstruction going on, making us do unnecessary work.
And we'll see all sorts of indirect effects, because society is
pretty well linked.

Software hoarding is one form that the tendency to obstruct
society for profit takes; one that pertains to our field, but
that actually exists in some other fields as well, to greater or
lesser extents. And the more people see this going on, the more
are going to be inclined to do so themselves when @emph%they% get
a chance, and the more they're going to be demoralized and
willing to put up with it, and not fight against it when they
encounter it in others. But conversely, any time we take a stand
against some of ownership because it makes the whole world
poorer, we'll help other people stand up in the future, and we'll
help spread the idea that you should ask not what your country
can do for you, but what you can do for your country.

[QUESTIONS]

Q: Your talk is very impressive, it's almost like a sermon...
RMS: Yes, it is. Q: and it's difficult to put all the pieces
together and argue with it, but I find it especially difficult to
see how your alternative system would work, or even exactly how
you imagine it to function. Let me you this: you didn't mention
music. You mentioned recipes and other things. RMS: yes. Q:
But music is an interesting analog also, with the score; because
the composers have a union, and everything, and they not only---

RMS: It supports them very poorly. Copyright as a way to support
composers or musicians is a @emph%flop%. We should throw it away
and get something new. We're the only advanced country that
still relies on that.

Q: Well, the question I wanted to ask you---I realize it doesn't
work very well, but they hope that they can get some profit from
the publication of the printed score, but also if a producer of
say, a Broadway show, or a movie maker, makes a big profit by
@emph%performing% the composer's work, then the composer would
like to have a piece of that action too. And you can make an
analogy between that and a user of software.

RMS: You can, and I think in both cases you get problems further
down the line. See, the nature of knowledge, and information in
general, is to make use of it, you transform it, and mix it in
with other things. And to try to keep track of how much of a big
program was developed by this author, and how much by this person
and so on, it fundamentally can't be done unless you forbid them
to work together, which is what the current system effectively
does. It's perfectly possible to keep straight which company
developed something when nothing can ever go from one company to
another. And that's a tremendous harm.

The whole idea of encouraging the development of information
seems plausible because the information is useful. But in order
for it to be fully useful, you have to abandon the idea of
trying to keep track of who created it, because any component
could be created in many stages.

Now it's true it doesn't do very much harm to anyone if this
Broadway producer pays some money to the composer, assuming that
there was only one composer (of course, there's such a thing as
the folk process, and there's the process of arrangement as
well), but it just happened, I guess, that in music there
wouldn't normally be so many stages of transformation of one work
that it was hard to keep track of. And part of the reason is
that fundamentally, the value of music is aesthetic, and
therefore originality wasn't imposed simply for the sake of
intellectual property, it was valued for its own sake because
something that was not new was not aesthetically up to
contribution. A piece that was made by cannibalizing parts of a
few other pieces with a little bit that was new wouldn't turn
music listeners on very much; they'd just say %%oh, yeah! Well,
I remember that, I've heard that before in so-and-so's work.''
And in an area where originality has an intrinsic usefulness, you
won't get things being tacked on by one person, and another, and
gradually changed around so much, although in some areas of music
you do---in folk music, that's what happens [originality is not
the main concern in folk music]. And when there are fewer people
changing a work, it becomes less of an odious burden to try to
keep track of who did it, and if you're talking about in
particular, the Broadway producer, well, he's running a big
business anyway, and he can arrange to make a license and so on,
so in that situation it doesn't do very much harm.

There's a danger when somebody says that something is wrong with
a significant part of society---there's a certain problem that
you run into, which is that on one side, there are people who
call you a fanatic, and on the other side there are people who
call you inconsistent. If you look for every ramification of the
problem you see and demand that they all be completely excised
from society, people call you a fanatic. And if you don't look
for every ramification and demand that it be excised from
society, people call you inconsistent.

What I believe is that no one coordinate patch will map the whole
world very effectively. There are many phenomena; each
phenomenon is the controlling phenomenon in some areas and
insignificant in others. I'm concerned with eliminating
intellectual property mainly in the field of software, because
there I see it really uglifying society and causing tremendous
waste. If it doesn't cause so much waste in the area of music,
then I don't feel it's so important to change it there.
Although, there are certain areas where I object to it, and you
can see the battle is shaping up again because of the ability of
individuals to copy.

You may have heard of the proposed laws to tax recorders and tax
tape, and pay the money to record companies, or to musicians, in
proportion to their sales. Well, I'd be happy to see a tax on
tape or tape recorders to support musicians, but @emph%not% in
proportion to their sales! If your goal is to help the
struggling musicians (and most musicians are @emph%really%
struggling, because our current copyright system doesn't support
them at all), I'd say that that tax should go to the musicians
who make a @emph%few% sales, but not very many. Because the ones
who make a lot are rich, and they don't need a handout.

Q: I'm not sure of the legal changes you're proposing. There's
at least three ways in which software can be proprietary. One
is copyright laws, which you're obviously against. RMS: yes. Q:
Another is by entering into a contract: I promise not to copy, I
promise not to disassemble, I promise to be a bad citizen. The
third is you can use encryption methods, which perhaps our
copyright laws, hardware manufacturers support in the processor
ID [???]. My question is this: are you proposing to make
entering into certain kinds of contracts illegal, and are you
proposing to make encrypting in order to hoard software illegal?

RMS: Well, I haven't seen hardware copy protection schemes that
manage to win. Encryption, I agree, can prevent you from
changing a program, but I don't see how it can prevent you from
copying it, because you could copy the encrypted thing. Q: but
you're still avoiding the question... [not true; that was one
half of the question] A: I would say that a nondisclosure
agreement like that should be called unenforceable, like gambling
debts. Clearly to try to stop people from keeping secrets would
be tyrannical and I wouldn't be in favor of trying to do that.
The other thing to realize is that trade secrecy is not fully
built on those contracts. Those contracts are one step you go
through to establish something as a trade secret. But there's an
entire body of trade secret law that imposes things on people who
have not signed those contracts. So in that area, just as in the
other areas of copyright and patents, there's explicit government
intervention which has nothing to do with voluntary contracts, to
give power to software hoarders, and if that were taken so that
we had nothing but the voluntary contracts, we'd have a lot less
power in trade secrecy than we do now.

Q: One other question. Sometimes you seem very concerned about
the [??] of software. But when it comes to, for instance,
supporting musicians, you seem to be saying [????]

RMS: The public is @emph%already% supporting @emph%those%
musicians, and they will make a lot of money anyway, from their
concerts and so on. And what I'm saying is that obviously, we
should only have a tax like that if people think it's desirable.
Maybe people think it's desirable to support starting musicians,
and musicians whose lives are marginal but who some people like.
And I think you could set that up in such a way that only a
person who was yearning to be a musician would consider it
attractive, and therefore you wouldn't have to worry about
someone sponging off of it in order to get out of doing any work.

Q: While I sympathize with the position you've laid out, it
reminds of the debate between capitalism and communism. RMS: Oh,
no, it's very different. I'll explain to you the difference. Q:
OK, well, the specific point I'd like you to explain then is that
while communism is appealing, it removes some basic human
incentives that are based on self-interest.

RMS: There are lots of kinds of self-interest, and what they are
depends on the social situation. There are also lots of kinds of
competition. For example, there was competition among hackers in
the old days, for who could do a better program, or could make a
program shorter and faster. That competition, though, didn't
involve obstruction; yet it motivated people very powerfully, and
you can see in many areas of life where people are motivated by a
wish to excel their rivals, to do better than anyone else had
done. And they might even spend gigantic amounts trying to do
this. Have you read about the people who were competing to visit
all the countries in the world first? They spent incredible
amounts of money trying to do that. But as for the fundamental
question, communism and capitalism are similar in that they're
very concerned with %%how much money should each person get?''.
Capitalism the position of a person who says %%I want to have the
power to get all the money that my might can bring me'', whereas
communism says everyone should have the same amount of money, or
everybody should have an amount of money that's totally
determined by what that person needs in some sense. But what I'm
saying is, we all have to pay less attention to how much money
each of us has, because we're impoverishing each other by paying
too much attention to it. [TAPE ENDS.]

>> *END* <<

(The following was extracted from a public e-mail file and
is reproduced unedited, with the exception of deletion of
multiple lines created by the transmission format--eds.)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
* * * * COPYRIGHT LAW ** * *
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

I've received a couple of requests for more information on
copyright law. A fairly good introduction is included with the
netnews (usenet) software. Note that some things have changed
since this was written (e.g. copyright notices are no longer
mandatory, penalties for infringement have doubled).

One point I think the author should have made is that the basis
for copyright law in the U.S. is constitutional (Art. I Sec. 8):
"The Congress shall have Power ... To promote the Progress of
Science and useful Arts, by securing for limited Times to Authors
and Inventors the exclusive Right to their respective writings
and Discoveries."

I did some rather disgusting postprocessing to make nroff output
acceptable to BITNET; this should print properly on a printer
with 66 lines per page and no perforation skip.

-=EPS=-


Copyright Law


Jordan J Breslow
1225 Alpine Road Suite 200
Walnut Creek CA 94596
1 415 932 4828


I am an attorney practicing copyright law and computer law.
I read a series of queries in net.legal about copyright law and
was dismayed to find that people who had no idea what they were
talking about were spreading misinformation over the network.
Considering that the penalties for copyright infringement can in-
clude $50,000.00 damages per infringed work, attorneys fees,
court costs, criminal fines and imprisonment, and considering
that ignorance is no excuse and innocent intent is not even a
recognized defense, I cringe to see the network used as a soapbox
for the ill-informed. For that reason, this article will discuss
copyright law and license law as they pertain to computer
software.

My goal is to enable readers to determine when they should
be concerned about infringing and when they can relax about it.
I also want to let programmers know how to obtain copyright for
their work. I'll explain the purpose of software licenses, and
discuss the effect that the license has on copyright. For those
of you who are programmers, I'll help you decide whether you own
the programs you write on the job or your boss owns them. I will
also mention trademark law and patent law briefly, in order to
clarify some confusion about which is which. Incidentally, if
you read this entire essay, you will be able to determine whether
or not the essay is copyrighted and whether or not you can make a
printout of it.

This is a long article, and you may not want to read all of
it. Here is an outline to help you decide what to read and what
to ignore:
1. The Meaning of Copyright from the Viewpoint of the Software User
1.1 A bit of history
copyright
+1.2 The meaning of _________
public domain
+1.3 The meaning of ______ ______
1.4 A hypothetical software purchase
1.5 Can you use copyrighted software?
1.6 Can you make a backup copy?
1.7 Licenses may change the rules

+c Copyright 1986 Breslow, Redistributed by permission




1.8 Can you modify the program?
1.9 Can you break the copy protection scheme?
1.10 Summary

2. Copyright Sounds Neat -- How Do I Get One?
Or, How Do I Know If this Program is Copyrighted?
2.1 How do you get a copyright?
2.2 How do you lose a copyright?
2.3 How do you waste a stamp?
2.4 Do you have to register?
2.5 How copyright comes into existence
2.6 The copyright notice
2.7 Advantages of registration
2.8 A test to see if you understand this article

3. Who Owns The Program You Wrote?
3.1 Introduction
3.2 Programs written as an employee
3.3 Programs written as a contractor

4. A Brief Word about Licenses
4.1 Why a license?
4.2 Is it valid?

5.1 Trademark law explained
5.2 Patent law

6. Conclusion

1. The Meaning of Copyright from the Viewpoint of
the Software User

1.1. A bit of history

If you're not interested in history, you can skip this para-
Modern
+graph. ______ copyright law first came into existence in 1570,
by an act of Parliament called the Statute of Anne. Like most
laws, it hasn't changed much since. It was written with books
and pictures in mind. Parliament, lacking the foresight to
predict the success of the Intel and IBM corporations, failed to
consider the issue of copyrighting computer programs.

At first, courts questioned whether programs could be copy-
righted at all. The problem was that judges couldn't read the
programs and they figured the Copyright Law was only meant to ap-
ply to things humans (which arguabley includes judges) could read
without the aid of a machine. I saw some mythical discussion
about that in some of the net.legal drivel. Let's lay that to
rest: programs are copyrightable as long as there is even a
minimal amount of creativity. The issue was laid to rest with
the Software Act of 1980. That Act modified the Copyright Act
(which is a Federal law by the way), in such a way as to make it
clear that programs are copyrightable. The few exceptions to
this rule will rarely concern anyone. The next question to arise
was whether a program was copyrightable if it was stored in ROM
rather than on paper. The decision in the Apple v. Franklin
case laid that to rest: it is.

1.2. The meaning of copyright

Now, what is copyright? As it is commonly understood, it is
the right to make copies of something -- or to put it the other
way around, it is the right to prohibit other people from making
copies. This is known as an exclusive right -- the exclusive
reproduce
+right to _________, in the biological language of the Copyright
Act -- and what most people don't know is that copyright involves
not one, not two, but five exclusive rights. These are (1) the
exclusive right to make copies, (2) the exclusive right to dis-
tribute copies to the public, (3) the exclusive right to prepare
derivative works
+__________ _____ (I'll explain, just keep reading), (4) the ex-
clusive right to perform the work in public (this mainly applies
to plays, dances and the like, but it could apply to software),
and (5) the exclusive right to display the work in public (such
as showing a film).

1.3. The meaning of public domain

Before we go any further, what is public domain? I saw some
discussion on the net about public domain software being copy-
public domain
+righted. Nonsense. The phrase ______ ______, when used correct-
ly, means the absence of copyright protection. It means you can
copy public domain software to your heart's content. It means
that the author has none of the exclusive rights listed above.
public domain freeware
+If someone uses the phrase ______ ______ to refer to ________
(software which is copyrighted but is distributed without advance
payment but with a request for a donation), he or she is using
the term incorrectly. Public domain means no copyright -- no ex-
clusive rights.

1.4. A hypothetical software purchase

Let's look at those exclusive rights from the viewpoint of
someone who has legitimately purchased a single copy of a copy-
righted computer program. For the moment, we'll have to ignore
the fact that the program is supposedly licensed, because the
license changes things. I'll explain that later. For now, as-
sume you went to Fred's Diner and Software Mart and bought a
dozen eggs, cat food and a word processing program. And for now,
assume the program is copyrighted.

1.5. Can you use copyrighted software?

What can you do with this copyrighted software? Let's start
with the obvious: can you use it on your powerful Timex PC? Is
this a joke? No. Prior to 1980, my answer might have been No,
you can't use it!

People actually pay me for advice like that! Well think:
you take the floppy disk out of the zip lock baggy, insert it in
drive A and load the program into RAM. What have you just done?
You've made a copy in RAM -- in legalese, you've reproduced the
work, in violation of the copyright owner's exclusive right to
reproduce. (I better clarify something here: the copyright own-
er is the person or company whose name appears in the copyright
notice on the box, or the disk or the first screen or wherever.
It may be the person who wrote the program, or it may be his
boss, or it may be a publishing company that bought the rights to
the program. But in any case, it's not you. When you buy a copy
of the program, you do not become the copyright owner. You just
own one copy.)

Anyway, loading the program into RAM means making a copy.
The Software Act of 1980 addressed this absurdity by allowing you
to make a copy if the copy "is created as an essential step in
the utilization of the computer program in conjunction with a
machine and ... is used in no other manner ...." By the way,
a machine
+somebody tell me what _ _______ means. If you connect 5 PC's on
a machine several machines
+a network is that _ _______ or _______ ________? A related ques-
tion is whether or not running software on a network constitutes
a performance. The copyright owner has the exclusive right to do
that, remember?

1.6. Can you make a backup copy?

OK, so you bought this copyrighted program and you loaded it
into RAM or onto a hard disk without the FBI knocking on your
+door. Now can you make a backup copy? YES. The Software Act
also provided that you can make a backup copy, provided that it
"is for archival purposes only ...." What you cannot do, howev-
er, is give the archive copy to your friend so that you and your
pal both got the program for the price of one. That violates the
copyright owner's exclusive right to distribute copies to the
public. Get it? You can, on the other hand, give both your ori-
ginal and backup to your friend -- or sell it to him, or lend it
to him, as long as you don't retain a copy of the program you are
selling. Although the copyright owner has the exclusive right to
distribute (sell) copies of the program, that right only applies
to the first sale of any particular copy. By analogy, if you buy
a copyrighted book, you are free to sell your book to a friend.
The copyright owner does not have the right to control resales.

1.7. Licenses may change the rules

At this point, let me remind you that we have assumed that
the program you got at the store was sold to you, not licensed to
you. Licenses may change the rules.

1.8. Can you modify the program?

Now, you're a clever programmer, and you know the program
could run faster with some modifications. You could also add
graphics and an interactive mode and lots of other stuff. What
does copyright law say about your plans? Well ... several dif-
ferent things, actually. First, recall that the copyright owner
has the exclusive right to make derivative works. A derivative
work is a work based on one or more preexisting works. It's easy
to recognize derivative works when you think about music or
books. If a book is copyrighted, derivative works could include
a screenplay, an abridged edition, or a translation into another
language. Derivative works of songs might be new arrangements
(like the jazz version of Love Potion Number 9), a movie
long version
+soundtrack, or a written transcription, or a ____ _______, (such
as the fifteen minute version of "Wipe Out" with an extended drum
solo for dance parties). In my opinion, you are making a deriva-
tive work when you take the store-bought word processor and modi-
fy it to perform differently. The same would be true if you
translated
+__________ a COBOL program into BASIC. Those are copyright in-
fringements -- you've horned in on the copyright owner's ex-
clusive right to make derivative works. There is, however, some
adapt
+breathing room. The Software Act generously allows you to _____
the code if the adaptation "is created as an essential step in
the utilization of the computer program in conjunction with a
machine ...." For example, you might have to modify the code to
make it compatible with your machine.

1.9. Can you break the copy protection scheme?

Moving right along, let's assume your store bought program
is copy protected, and you'd really like to make a backup copy.
You know this nine-year-old whiz who can crack any copy-
protection scheme faster than you can rearrange a Rubix cube. Is
there a copyright violation if he succeeds? There's room to ar-
gue here. When you try to figure out if something is an infringe-
ment, ask yourself, what exclusive right am I violating? In this
case, not the right to make copies, and not the right to distri-
bute copies. Public performance and display have no relevance.
derivative work
+So the key question is whether you are making a __________ ____.
My answer to that question is, "I doubt it." On the other hand,
I also doubt that breaking the protection scheme was "an essen-
tial step" in using the program in conjunction with a machine.
It might be a "fair use," but that will have to wait for another
article. Anyone interested in stretching the limits of the "fair
Betamax
+use" defense sho

  
uld read the Sony _______ case.

1.10. Summary

Let me summarize. Copyright means the copyright owner has
the exclusive right to do certain things. Copyright infringement
means you did one of those exclusive things (unless you did it
within the limits of the Software Act, i.e., as an essential step
....).

2. Copyright Sounds Neat -- How Do I Get One? Or, How Do I Know
if this Program is Copyrighted?

2.1. How do you get a copyright?

If you've written an original program, what do you have to
do to get a copyright? Nothing. You already have one.

2.2. How do you lose a copyright?

If you've written an original program, what do you have to
do to lose your copyright protection? Give copies away without
the copyright notice.

2.3. How do you waste a stamp?

If you mail the program to yourself in a sealed envelope,
what have you accomplished? You've wasted a stamp and an envelope
and burdened the postal system unnecessarily.

2.4. Do you have to register?

Do you have to register your program with the U.S. Copyright
Office? No, but it's a damn good idea.

2.5. How copyright comes into existence

Copyright protection (meaning the five exclusive rights)
fix tangi-
+comes into existence the moment you ___ your program in a ______
ble medium
+___ ______. That means write it down, or store it on a floppy
disk, or do something similar. Registration is optional. The
one thing you must do, however, is protect your copyright by in-
cluding a copyright notice on every copy of every program you
sell, give away, lend out, etc. If you don't, someone who hap-
pens across your program with no notice on it can safely assume
that it is in the public domain (unless he actually knows that it
is not).

2.6. The copyright notice

The copyright notice has three parts. The first can be ei-
ther a c with a circle around it (c), or the word Copyright or
the abbreviation Copr. The c with a circle around it is prefer-
able, because it is recognized around the world; the others are
not. That's incredibly important. Countries around the world
have agreed to recognize and uphold each others' copyrights, but
this world-wide protection requires the use of the c in a circle.
On disk labels and program packaging, use the encircled c. Un-
fortunately, computers don't draw small circles well, so program-
mers have resorted to a c in parentheses: (c). Too bad. That
has no legal meaning. When you put your notice in the code and
on the screen, use Copyright or Copr. if you can't make a cir-
cle.

The second part of the notice is the "year of first publica-
Publication
+tion of the work." ___________ doesn't mean distribution by Os-
borne Publishing Co. It means distribution of copies of the pro-
gram to the public "by sale or other transfer of ownership, or by
rental, lease, or lending." So when you start handing out or
selling copies of your precious code, you are publishing. Publi-
cation also takes place when you merely OFFER to distribute
copies to a group for further distribution. Your notice must in-
clude the year that you first did so.

The third part of the notice is the name of the owner of the
copyright. Hopefully, that's you, in which case your last name
will do. If your company owns the program -- a legal issue which
I will address later in this article -- the company name is ap-
propriate.

Where do you put the notice? The general idea is to put it
where people are likely to see it. Specifically, if you're dis-
tributing a human-readable code listing, put it on the first page
in the first few lines of code, and hard code it so that it ap-
pears on the title screen, or at sign-off, or continuously. If
you're distributing machine-readable versions only, hard code it.
As an extra precaution, you should also place the notice on the
gummed disk label or in some other fashion permanently attached
to the storage medium.

2.7. Advantages of registration

Now, why register the program? If no one ever rips off your
program, you won't care much about registration. If someone does
rip it off, you'll kick yourself for not having registered it.
The reason is that if the program is registered before the in-
fringement takes place, you can recover some big bucks from the
infringer, called statutory damages, and the court can order the
infringer to pay your attorneys fees. Registration only costs
$10.00, and it's easy to do yourself. The only potential disad-
vantage is the requirement that you deposit the first and last 25
pages of your source code, which can be inspected (but not
copied) by members of the public.

2.8. A test to see if you understand this article

Now, someone tell me this: is this article copyrighted?
Can you print it?

3. Who Owns The Program You Wrote?

3.1. Introduction

The starting point of this analysis is that if you wrote the
program, you are the author, and copyright belongs to the author.
HOWEVER, that can change instantly. There are two common ways for
your ownership to shift to someone else: first, your program
might be a "work for hire." Second, you might sell or assign

rights
+your ______ in the program, which for our purposes means the
copyright.

3.2. Programs written as an employee

Most of the programs which you write at work, if not all of
them, belong to your employer. That's because a program prepared
by an employee within the scope of his or her employment is a
author
+"work for hire," and the employer is considered the ______. This
is more or less automatic if you are an employee -- no written
agreement is necessary to make your employer the copyright owner.
By contrast, if you can convince your employer to let you be the
copyright owner, you must have that agreement in writing.

By the way, before you give up hope of owning the copyright
to the program you wrote at work, figure out if you are really an
employee. That is actually a complex legal question, but I can
tell you now that just because your boss says you are an employee
doesn't mean that it's so. And remember that if you created the
scope
+program outside the _____ of your job, the program is not a "work
for hire." Finally, in California and probably elsewhere, the
state labor law provides that employees own products they create
on their own time, using their own tools and materials. Employ-
ment contracts which attempt to make the employer the owner of
inventions
+those off-the-job __________ are void, at least in sunny Califor-
nia.

3.3. Programs written as a contractor

Wait a minute: I'm an independent contractor to Company X,
not an employee. I come and go as I please, get paid by the hour
with no tax withheld, and was retained to complete a specific
project. I frequently work at home with my own equipment. Is
the program I'm writing a "work for hire," owned by the Company?
Maybe, maybe not. In California, this area is full of landmines
for employers, and gold for contractors.

A contractor's program is not a "work for hire," and is not
owned by the company, unless (1) there is a written agreement
between the company and the contractor which says that it is, and
commissioned work commissioned work
+(2) the work is a ____________ ____. A ____________ ____ is one
collective work
+of the following: (a) a contribution to a __________ ____, (b)
an audiovisual work (like a movie, and maybe like a video game),
(c) a translation, (d) a compilation, (e) an instructional text,
(f) a test or answer to a test, or (g) an atlas. I know you must
be tired of definitions, but this is what the real legal world is
made of. An example of a collective work is a book of poetry,
with poems contributed by various authors. A piece of code which
is incorporated into a large program isn't a contribution to a
collective work, but a stand-alone program which is packaged and
sold with other stand-alone programs could be.

So where are we? If you are a contract programmer, not an
commissioned work
+employee, and your program is a ____________ ____, and you have a

written agreement that says that the program is a "work for hire"
owned by the greedy company, who owns the program? That's right,
the company. But guess what? In California and elsewhere the
company just became your employer! This means that the company
+must now provide worker's compensation benefits for you AND UNEM-
PLOYMENT INSURANCE

4. A Brief Word About Licenses.

4.1. Why a license?

When you get software at the local five and dime, the
manufacturer claims that you have a license to use that copy of
the program. The reason for this is that the manufacturer wants
to place more restrictions on your use of the program than copy-
right law places. For example, licenses typically say you can
only use the program on a single designated CPU. Nothing in the
copyright law says that. Some licenses say you cannot make an
archive copy. The copyright law says you can, remember? But if
the license is a valid license, now you can't. You can sell or
give away your copy of a program if you purchased it, right?
That's permitted by copyright law, but the license may prohibit
it. The more restrictive terms of the license will apply instead
of the more liberal copyright rules.

4.2. Is it valid?

Is the license valid? This is hotly debated among lawyers.
(What isn't? We'll argue about the time of day.) A few states
have passed or will soon pass laws declaring that they are valid.
A few will go the other way. Federal legislation is unlikely.
My argument is that at the consumer level, the license is not
binding because there is no true negotiation (unless a state law
says it is binding), but hey that's just an argument and I'm not
saying that that's the law. In any case, I think businesses
which buy software will be treated differently in court than con-
sumers. Businesses should read those licenses and negotiate with
the manufacturer if the terms are unacceptable.

5. I Have A Neat Idea. Can I Trademark It? What About patent?

5.1. Trademark law explained

Sorry, no luck. Trademark law protects names: names of
products and names of services. (Note that I did not say names
of companies. Company names are not trademarkable.) If you buy
a program that has a trademarked name, all that means is that you
can't sell your own similar program under the same name. It has
nothing to do with copying the program.

5.2. Patent Law

Patent law can apply to computer programs, but it seldom
does. The main reasons it seldom applies are practical: the
patent process is too slow and too expensive to do much good in
the software world. There are also considerable legal hurdles to
overcome in order to obtain a patent. If, by chance, a program
is patented, the patent owner has the exclusive right to make,
use or sell it for 17 years.

6. CONCLUSION

I know this is a long article, but believe it or not I just
scratched the surface. Hopefully, you'll find this information
useful, and you'll stop passing along myths about copyright law.
If anyone needs more information, I can be reached at the address
on the first page. Sorry, but I do not usually have access to
the network, so you can't reach me there.

Thank you. JORDAN J. BRESLOW

>> *END* <<

(The following is reprinted from public e-mail sources--eds.)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-- Computer Law - State of Wisconsin Statute --
Chapter 293, Laws of 1981
943.70 Computer crimes.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

(1) DEFINITIONS. In this section:

(a) "Computer" means an electronic device that performs
logical, arithmetic and memory functions by manipulating
electronic or magnetic impulses, and includes all input,
output, processing, storage, computer software and
communication facilities that are connected or related to
a computer in a computer system or computer network.

(b) "Computer network" means the interconnection of
communication lines with a computer through remote
terminals or a complex consisting of 2 or more
interconnected computers.

(c) "Computer program" means an ordered set of instructions or
statements that, when executed by a computer, causes the
computer to process data.

(d) "Computer software" means a set of computer programs,
procedures or associated documentation used in the
operation of a computer system.

(dm) "Computer supplies" means punchcards, paper tape,
magnetic tape, disk packs, diskettes and computer output,
including paper and microform.

(e) "Computer system" means a set of related computer
equipment, hardware or software.

(f) "Data" means a representation of information, knowledge,
facts, concepts or instructions that has been prepared or
is being prepared in a formalized manner and has been
processed, is being processed or is intended to be
processed in a computer system or computer network. Data
may be in any form including computer printouts, magnetic
storage media, punched cards and as stored in the memory
of the computer. Data are property.

(g) "Financial instrument" includes any check, draft, warrant,
money order, note, certificate of deposit, letter of
credit, bill of exchange, credit or credit card,
transaction authorization mechanism, marketable security
and any computer representation of them.

(h) "Property" means anything of value, including but not
limited to financial instruments, information,
electronically produced data, computer software and
computer programs.

(i) "Supporting documentation" means all documentation used in
the computer system in the construction, clarification,
implementation, use or modification of the software or
data.

(2) OFFENSES AGAINST COMPUTER DATA AND PROGRAMS.

(a) Whoever willfully, knowingly and without authorization
does any of the following may be penalized as provided in
par. (b):

1. Modifies data, computer programs or supporting
documentation.

2. Destroys data, computer programs or supporting
documentation.

3. Accesses data, computer programs or supporting
documentation.

4. Takes possession of data, computer programs or supporting
documentation.

5. Copies data, computer programs or supporting
documentation.

6. Discloses restricted access codes or other restricted
access information to unauthorized person.

(b) Whoever violates this subsection is guilty of:

1. A Class A misdemeanor unless subd. 2, 3 or 4 applies.

2. A Class E felony if the offense is committed to defraud or
to obtain property.

3. A Class D felony if the damage is greater than $2,500 or
if it causes an interruption or impairment of governmental
operations or public communication, of transportation or
of a supply of water, gas or other public service.

4. A Class C felony if the offense creates a situation of
unreasonable risk and high probability of death or great
bodily harm to another.


(3) OFFENSES AGAINST COMPUTERS, COMPUTER EQUIPMENT OR SUPPLIES.

(a) Whoever willingly, knowingly and without authorization
does any of the following may be penalized as provided in
par. (b):

1. Modifies computer equipment or supplies that are used or
intended to be used in a computer, computer system or
computer network.

2. Destroys, uses, takes or damages a computer, computer
system, computer, network or equipment or supplies used or
intended to be used in a computer, computer system, or
computer network.

(b) Whoever violates this subsection is guilty of:

1. A Class A misdemeanor unless sub. 2,3 or 4 applies.

2. A Class E felony if the offense is committed to defraud or
obtain property.

3. A Class D felony if the damage to the computer, computer
system, computer network, equipment or supplies is greater
than $2,500.

4. A Class C felony if the offense creates a situation of
unreasonable risk and high probability of death or great
bodily harm to another.

-- Penalties for Infractions --

939.50(3) Penalties for felonies are as follows:

(a) For a Class A felony, life imprisonment.

(b) For a Class B felony, imprisonment not to exceed 20 years.

(c) For a Class C felony, a fine not to exceed $10,000 or
imprisonment not to exceed 10 year, or both.

(d) For a Class D felony, a fine not to exceed $10,000 or
imprisonment not to exceed 5 year, or both.

(e) For a Class E felony, a fine not to exceed $10,000 or
imprisonment not to exceed 2 year, or both.

939.51(3) Penalties for misdemeanors are as follows:

(a) For a Class A misdemeanor, a fine not to exceed $10,000 or
imprisonment not to exceed 9 months, or both.

(b) For a Class B misdemeanor, a fine not to exceed $1,000 or
imprisonment not to exceed 90 days, or both.

(c) For a Class C misdemeanor, a fine not to exceed $500 or
imprisonment not to exceed 30 days, or both.

>> *END* <<

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
* * * * PIRATE EDITORIAL, by * * * *
(by Mikey Mouse)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
BIG BROTHER IN OUR COMPUTER ROOM???

Rumour has it that this August, legislation will go
into effect making it a criminal offense to send or recieve
electronic porn through the phones, if it crosses state lines.
According to this rumour, the user need not know that the graphic
was porno (which is defined as any nudity). Breaking this law
three or more times will constitute doing so for business
purposes, subjection the violator to confiscation of all involved
computer equipment.

Leave aside for now that on the surface this wouldn't seem to
affect a board such as this one, that perpetrators will likely
outnumber enforcers by several orders of magnitude, and that 15
year olds (the median age of techno-pervs) are notoriously
difficult to prosecute. If true, this rumour has some disturbing
implications.

First, it points to the solidification of the legislative concept
of the electronic community as a genuine entity - almost a 'sixth
estate', when we have thrived for so long in large part due the a
BBS is. If it can't vote or be taxed ...

Second, it brings BBS's under the scrutiny of a group that many
find far scarier that congress, the FBI, or even the KGB - that's
right, the Fallwellians. These morality police have clearly
established that they have determination, large numbers of
followers, and, of course, no morals. If they also develop
sufficient intelligence (well, it MIGHT happen!) to realize that,
while they can't picket a BBS, they can turn them in to the Feds,
and badger the Feds into action, the result could be an onslaught
of M.O.R.O.N.S (Moral Opposition to Rot Of Naughty Smut) and
FATheads (Falwell Attack Team) infiltrating the PD, and then the
PI boards.

Seriously, though - if this does happen, it will provide one more
reason for authorities to investigate the contents of BBS's in
general, something that won't be good for anyone. This rumour
rings true to me - it's just the sort of thing our increasingly
Fundamentalist legislature would pass. I'm going to ask around
on CIS about this, since their PBW area would be affected. If
anyone else has info about this, I'd like to hear it.

(Eds note: To contact MB, call GREAT ESCAPE (312-535-2761) and
leave a note to "ALL")

>> *END* <<

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
* * SYSOPS CORNER: WHAT'S GOIN ON AT GREAT ESCAPE * *
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

PC Board 14.1/E3 is now running. There are going to be a lot of
new changes made in the next few weeks for the system. The board
is going to run Emulex/2 as a PCR/Point door for files and
messages for all members. In addition, ELITE members who have
remained faithful to the board in support will also have full
access to the PCBoard/Prodoor Batch system and will have FREE
file downloading and unlimited daily time privileges granted to
them. Except for ELITE members, all users will only have access
to the new door for transfers and messages. Users who don't keep
up their share of BOTH posted messages and files will recieve the
lowest access. We expect to have Node#2 ready and running at
2400 baud by early August 89' so until then, 1200 Baud is no
longer supported by this system. Don't be so cheap, get a 2400
or 9600 modem now... We may even come up under a new
system,location and phone number TBA...

We are now offering file points for credit to all current board
members who post 2-3 messages per logon. These messages must be
useful and placed in their correct conference. Only messages
pretaining to the subject matter of the conference are
considered, no advertisements! I recommend that each message
post be informative and more than just 1 or 2 lines. Yes, we are
very serious. This offer stands and will be honored!

I'm happy to report that the new code of PC Board 14.1 now
supports all File compression formats including .ARC, .PAK, .ZIP,
LZH and many others As soon as we get a new version of ProDOOR
later than our 2.9 version, also supports these, we will allow
all formats on this board for transfer as well as file viewing
and extracting. The new code also directly supports EMS and
34800 Baud Rates with v.32 and v.42 functions.

The new USR 9600 HST gets 19,200 baud Connect on PCBoard using
old and new serial chip technology under DOS with up to 26,100
throughput using MNP Class 5 Data compression and error control.
We now, of course, support YMODEM-G (Registered DSZ) MNP-5
transfers for best results.

We will NO LONGER be supporting users of 1200 BAUD MODEMS OR
CONNECTS. So if you have been connecting at 1200 thru PCP or
using a 1200 baud modem, (Don't be so cheap, get a 2400 now...),
you will be outta luck. In 2 years of operation, I'd say we have
only had 2 or 3 users ever contribute regulary at 1200, so it
seems we would be wasting our's and your time with it. Even 2400
is slow but it's standard, so we have to support it for awhile.
Next week, ALL 1200 callers will find a reduction in daily time
or no time. New Users at 1200 baud will be denied access. All
users using 4800 Baud modems or connects and above may get better
access time and daily K than 2400 users.

Added several PC Pursuit Zmodem Transmit Varients for diehard
Pursuit users, try them for better performance on your next PCP
DSZ download. SuperK Batch protocols are added for Jmodem,
Super8K, and K9Xmodem batch upload and downloading -Not tested-,
BATCH TRANSFERS are mainly for REGULAR or ELITE users. Still
hoping to get BI-Modem going next week. Watch for some new DOORS
coming next month. Possible Point-System Board Door running
Emulex/2 also...

NEW Private USERS are mainly allowed to download our GELIST.ZIP
filelist. Bulletins show what we are looking for and good
uploads get fastest access We have no time or energy to waste on
anything else...NO DONATIONS, sorry.
- - - - - - - -
(If you're a sysop and want to sound off, hype your board,
or need some info, contact us--eds.)

>> *END* <<

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
* * * * WANTS AND NEEDS * * *
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

This section will cover specialized want lists, so if you have
a program to swap or are looking for one, here's where to
announce it.
>> *END* <<

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
MONTHLY REVIEW: THE GREAT ESCAPE (312-535-2761)
By -=*JEDI*=-
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

How do ya review a pirate board? They ain't got no plot, popcorn,
or 14 year old nymphettes to ogle. And if ya review one you're on
and the sysop don't like it, off ya goes, and if the sysop's a
buddy, then the review's gotta be good. So, I says, why not do
THE GREAT ESCAPE? Might as well jump into the fray and piss off
everyone. So, here goes.

GREAT ESCAPE's a pretty cool board. In fact, guess it's one of
the top 10 in the U.S. Has about half a gig of latest top line
warez and not a lot of garbage. Nice thing about it is how it's
laid out....files are organized into 3 main conferences, and each
conference is subdivided into specialty areas. The newcomers'
conference has enough stuff to keep novices happy and give them a
chance to prove themselves. The Entertainment conference, for
gamerz, is subdivided into a bunch of areas depending on kinds of
games ya like, and most of the stuff is cracked. The Business
conference is the most impressive, and has 14 areas, divided up
into stuff like desktop publishing, telecomm, and the rest.

Neatest thing about GREAT ESCAPE is that you can be pretty sure
that the stuff will work. Maxx Cougar, the head czar and
some-time despot, tests each one out before it goes up. If
there's a problem, he yanks it. If the uploader just made a
mistake, only a whipping happens. Sometimes mistakes happen, and
if there's a problem with a program, the sysop(s) will get ahold
of the original uploader or somebody else is around to make it
right. There's no lame stuff, and files are nearly always
complete, directly copied from original disks.
Lamerz are kicked off immediately, though, so be forewarned.

Biggest problem is that most of the stuff is off-line to save
space. To get it, ya have to request it from the sysops. This can
be a drag, 'cause sometimes they forget, but if ya keeps at 'em,
they'll get the requested files up. Guess this is ok, though,
'cause it keeps room for newer stuff. Sysops don't take much
shit, which is good, and if ya screw up an upload, be prepared
for some public scolding.

GE's pretty popular, so it's pretty hard to get on. Ya also have
to prove yourself before higher access is given. Seems like the
trick is to upload quality stuff over a period of time, don't be
a jerk, post some good info in the message section, and you'll be
ok.

Users are mostly pretty cool. There's too many message
conferences to count on my fingers, and seems there's always
somebody around who can answer questions. One neat thing is ya
gets credit for posting messages, but they're supposed to be
intelligent messages, but ya don't have to use big words, which I
kinda like.

On a 10 point scale, comparing with other top boards, guess my
rating would be
Warez = 9.5
Users = 8
Messages = 8
Sysops = 9.5
Ease of use = 9
--------------

>> *END* <<

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
* * * * SOME OF OUR FAVORITE BOARDZ * * * *
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

206-255-1282 ETHEREAL DIMENSION LARGEST IN NORTHWEST
212-519-1791 THE RUNNING BOARD BBS
217-328-8181 THETA-SIGMA 3/12/24 ASK FOR IBMP NODE
301-384-2938 GATES OF DAWN FIRM DIST. BOARD - NAPPA #1
303-431-2931 KILLER FAJETAS FROM HELL 150 FREE MEGS
303-969-8195 THE DISCORDIAN SOCIETY 12/2400 RUNNING PCBOARD
312-282-9279 SKI LODGE RBBS
312-297-5385 GAMERS GALAXY GOOD BBS
312-385-2764 SHADE-TREE, BBS P/D - S/W AND CONFERENCES
312-390-6594 DEFENDER PCBD
312-426-8228 THE SHOP RUNNING PC-BOARD - BACKROOM
312-481-2130 WASTELANDS BBS 3/12/2400 RUNNING PCBOARD
312-509-1816 DARK SIDE MONARCH
312-582-9249 FRONT LINE FORM
312-699-6353 GRAVEYARD FORM
312-749-8139 WAR ZONE TAG
312-756-2023 THE JOUSTING FIELDS SPECTRUM 2.1C - 42 MEGS
312-831-0456 FERS CENTRAL 1200-2400/SBBS
312-991-4639 WILD WEST MONARCH
404-921-4635 SUNBANE ELITE BBS 12/24/9600 135+ MGS, EMULEX
404-923-3870 THE DUCK ELITE BBS 12/2400 RUNNING PCBOARD
408-251-4689 THE PUBB BBS 3/12/2400 RUNNING EMULEX/2
408-268-6692 CITY OF THIEVES 3/12/2400 RUNNING PCBOARD
416-467-6387 EUPHORIA 160 MEGS - FIRM DIST. #1 -
703-971-7874 CORNERSTONE BBS THE FIRM
716-636-4540 PLUTONIUM MINES 160 MEGS - VGA GIFS! - PTL -
719-260-8472 PLAYDO LAND I 3/12/2400 RUNNING SYS-PC 2.7
801-485-7646 BESERKER BBS 12/2400 RUNNING PC BOARD
804-451-3551 THE MAGE'S LAIR 3/12/2400 RUNNING PCBOARD
815-895-5573 SYCAMORE ELITE OPUS (RESTRICTED)

If you have the names and numbers of elite boards, pass them
along.

>> *END* <<

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Well, we ran out of room. With luck, PIRATE will appear
bi-monthly, but we'll see how it goes. Best way to contact us
is through the home board. If you have any suggestions, or if
there's something you would like to see covered, let us know, or
better yet, write it up and call it in.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


------------------
COMING NEXT ISSUE:
*More on computer law
*Viruses
*Board of the Month
*And more. . .
------------------

//////////////////////////////////////////////
/ /
/ END Vol. I, No. 1 /
/ /
//////////////////////////////////////////////

next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT